(VU#252743, CVE-2014-6271, CVE-2014-7169)
Last Updated: October 7, 2014
1. Overview
GNU Bourne-Again Shell (Bash) contains a vulnerability that could allow an attacker to remotely execute shell commands by attaching malicious code in environment variables used by the operating system. This vulnerability is commonly referred to as "Shellshock".
September 24, 2014
GNU Bash vulnerability (CVE-2014-6271) in environment variables parsing was disclosed to the public. Security update for GNU Bash vulnerability (CVE-2014-6271) has been released for most major Linux distributions.
September 25, 2014
GNU Bash Incomplete Fix Remote Code Execution Vulnerability (CVE-2014-7169) was disclosed to the public.
September 26, 2014
Security update for GNU Bash vulnerability (CVE-2014-7169) has been released for most major Linux distributions. Also, Red Hat reported "Out of Bounds Memory Access Denial of Service Vulnerability (CVE-2014-7186)" and "Off-By-One Error Denial of Service Vulnerability (CVE-2014-7187)".
September 27, 2014
GNU Bash Incomplete Fix Remote Code Execution Vulnerability (CVE-2014-6277 and CVE-2014-6278) was disclosed to the public.
CVSS Severity
CVE-2014-6271: GNU Bash Remote Code Execution Vulnerability
CVE-2014-7169: GNU Bash Incomplete Fix Remote Code Execution Vulnerability
CVE-2014-7186: Out of Bounds Memory Access Denial of Service Vulnerability
CVE-2014-7187: Off-By-One Error Denial of Service Vulnerability
CVE-2014-6277: GNU Bash Incomplete Fix Remote Code Execution Vulnerability
CVE-2014-6278: GNU Bash Incomplete Fix Remote Code Execution Vulnerability
Base Metrics: 10.0
Access Vector: Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete
Temporal Metrics 8.7 (September 27, 2014)
Exploitablity: High
Remediation Level: Official fix
Report Confidence: Confirmed
2. Affected Systems
+ GNU Bash through 4.3
+ Linux, BSD, and UNIX distributions that use GNU Bash
+ Hitachi Products that use GNU Bash
3. Impact
By attacking a service that uses a vulnerable version of GNU Bash, a remote, unauthenticated attacker may be able to execute shell commands by attaching malicious code in environment variables used by the operating system.
Web application
CGI scripts are likely affected by this issue: when a CGI script is run by the web server, it uses environment variables to pass data to the script.
Secure Shell (SSH)
This issue can be used to execute any command to bypass the restricted command control.
DHCP client
DHCP client uses various environment variables and runs Bash to configure the network interface. Connecting to a malicious DHCP server could allow an attacker to remotely execute arbitrary commands.
Mail server
qmail uses various environment variables to refer the value of mail from: and rcpt to:. This can be used to execute arbitrary commands by specially crafted environment variables.
Figure 1. (Example) Arbitrary shell commands execution by specially crafted environment variables.
4. Solution
Apply an update
This issue is addressed in GNU Bash. Followings are security update of Linux distributions. Also, please refer to the advisories in "5. Product Information" of Hitachi.
CentOS
CVE-2014-6271
[CentOS] Critical update for bash released today.
http://lists.centos.org/pipermail/centos/2014-September/146099.html
CVE-2014-7169
[CentOS-announce] CESA-2014:1306 Important CentOS 5 bash Security Update
http://lists.centos.org/pipermail/centos-announce/2014-September/020591.html
[CentOS-announce] CESA-2014:1306 Important CentOS 6 bash Security Update
http://lists.centos.org/pipermail/centos-announce/2014-September/020593.html
[CentOS-announce] CESA-2014:1306 Important CentOS 7 bash Security Update
http://lists.centos.org/pipermail/centos-announce/2014-September/020592.html
Debian
CVE-2014-6271
DSA-3032-1 bash -- security update
https://www.debian.org/security/2014/dsa-3032
CVE-2014-7169
DSA-3035-1 bash -- security update
https://www.debian.org/security/2014/dsa-3035
Red Hat
CVE-2014-6271
RHSA-2014-1293 Critical: bash security update
https://rhn.redhat.com/errata/RHSA-2014-1293.html
RHSA-2014-1294 Critical: bash security update
https://rhn.redhat.com/errata/RHSA-2014-1294.html
RHSA-2014-1295 Critical: bash Shift_JIS security update
https://rhn.redhat.com/errata/RHSA-2014-1295.html
CVE-2014-7169,CVE-2014-7186,CVE-2014-7187
RHSA-2014-1306 Important: bash security update
https://rhn.redhat.com/errata/RHSA-2014-1306.html
RHSA-2014-1311 Important: bash security update
https://rhn.redhat.com/errata/RHSA-2014-1311.html
RHSA-2014-1312 Critical: bash Shift_JIS security update
https://rhn.redhat.com/errata/RHSA-2014-1312.html
CVE-2014-6277,CVE-2014-6278
Resolution for Bash Code Injection Vulnerability via Specially Crafted Environment Variables (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277, CVE-2014-6278) in Red Hat Enterprise Linux
https://access.redhat.com/solutions/1207723
Ubuntu
CVE-2014-6271,CVE-2014-7169
USN-2363-1: Bash vulnerability
http://www.ubuntu.com/usn/usn-2363-1/
USN-2363-2: Bash vulnerability
http://www.ubuntu.com/usn/usn-2363-2/
CVE-2014-7186,CVE-2014-7187
USN-2364-1: Bash vulnerabilities
http://www.ubuntu.com/usn/usn-2364-1/
5. Product Information
October 6, 2014
+ AlaxalA Networks AX series <Products Confirmed Not Vulnerable>
[AX8600R/6700S/6600S/6300S, AX4600S/3800S/3600S/2400S]
[AX7800R/7700R/7800S/5400S]
[AX2500S/2200S/1200S]
[AX620R]
October 3, 2014
+ Hitachi Advanced Server HA8000 series <*>
+ Hitachi Advanced Server HA8500 series <*>
+ Client Blade FLORA bd100/bd500 series <*>
+ Thin Client FLORA Se210/Se330 series <*>
+ Hitachi bd Link <*>
+ Entry class disk array model BR1200 <*>
+ Tape Library L1/8A, Lx/24, Lx/30A, Lx/48, L20/300, L18/500, L56/3000, L64/8500 <*>
+ Hitachi UPS/Management software/Hitachi UPS option, PowerMonitor H, PowerMonitor H for Network,
SNMP interface card, Disk interface card, SNMP+Disk interface card <*>
+ Display/Keyboard unit/Switch Console Unit <*>
+ Hitachi Server Navigator Update Manager, Log Collect, Log Monitor, Alive Monitor, RAID Navigator <*>
+ Hitachi Server Navigator Installation Assistant <*>
<*>: <Products Confirmed Not Vulnerable>
October 1, 2014
+ Hitachi Metals Switch Apresia series <Products Confirmed Not Vulnerable>
+ Hitachi Metals XLGMC/XGMC/GMC/GMX/eWAVE/BMC/GMA series <Products Confirmed Not Vulnerable>
September 30, 2014
+ Hitachi Open Middleware Products <Products Confirmed Not Vulnerable>
+ Hitachi Storage Products
+ VFP(Hitachi Virtual File Platform)
+ Virtage(BladeSymphonyBS2000/BS500/BS320/BS1000 series)
6. References
VU#252743: GNU Bash shell executes commands in exported functions in environment variables (2014-09-25)
http://www.kb.cert.org/vuls/id/252743
CVE-2014-6271
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271
CVE-2014-7169
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169
CVE-2014-7186
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186
CVE-2014-7187
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187
CVE-2014-6277
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277
CVE-2014-6278
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278
TA14-268A: GNU Bourne-Again Shell (Bash) 'Shellshock' Vulnerability (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE 2014-6278) (2014-09-25)
https://www.us-cert.gov/ncas/alerts/TA14-268A
ICSA-14-269-01: Bash Command Injection Vulnerability (2014-09-26)
https://ics-cert.us-cert.gov/advisories/ICSA-14-269-01
7. Update history
October 7, 2014
Masato Terada (HIRT) and Naoko Ohnishi (HIRT)